Encryption method of application software

a technology of application software and encryption method, applied in the field of encryption method, can solve the problems of expired passwords, inability to modify starting dates, and inability to permanently valid passwords

Active Publication Date: 2008-11-11
ZHIGU HLDG
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]According to the encryption method of the invention, different passwords are generated based on different user conditions. The starting date is bundled into the password in an encryption format. Therefore, even if the user finds

Problems solved by technology

Therefore, even if the user finds the starting information file or record, he or she is unable to modify

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method of application software
  • Encryption method of application software
  • Encryption method of application software

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0020]The process of generating a password is shown in FIG. 2, which is flowchart of the invention. First it indicates the user to use the software serial number for registration through a website (step 210). The user acts according to the indication and registers (step 220). The system verifies the registered user. It does not permit repetitive registration. For a user who repeats to register, the system indicates the user no need to register. The server judges the times of registration of the same account number, if detecting the registration account number being massively used, then it terminates the registration of that serial number account to prevent the serial number being stolen. The website server operates encryption according to the serial number and current date information and generates a starting password (step 230). It returns the starting password to the user (step 240). The user gets the starting password, inputs it to start the software (step 250).

[0021]The software...

second embodiment

[0023]FIG. 4 shows the operation flowchart of the invention. After a website downloadable software being installed and initiated, the software first checks whether the user has a password to start, if the program has been started with password, it goes ahead. Otherwise, the user has to register a new account number from the website (step 410). The system fetches the hard disk serial number as a unique identification code of the user and provides to the user (step 420). The user uses the unique identification code to apply a starting password (step 430). The website server checks whether the account number being massively used or incomplete in payment. If the account number is massively used, it identifies the illegal user. If the user has not finished the payment, the operation cannot continue. If the above examination conditions all pass, the website sever operates encryption according to the unique identification code and the server current date to generate a starting password (st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An encryption method for protecting application software is to first fetch a unique identification code of the application software at the user site. Then, transfer the unique identification code to a server for registration. The server operates according to the unique identification code and the current date information and generates a starting password. The starting password is transferred to the user for starting the application software. The encryption is made by applying a password from the website server based on a unique identification code and on-line verification.

Description

FIELD OF THE INVENTION[0001]The invention generally relates to an encryption method, and in particular relates to an encryption method of application software.BACKGROUND OF THE INVENTION[0002]In the “information” era, software is a kind of intelligence achievement, an invisible property, and significant to the information management and development of enterprise. Along with the considerable developments in the information security domain and the network security domain, software sold through network downloadable is broadly applied. Regardless of being a network downloadable software, or software sold in the market, how to encrypt the software and prevent it from being cracked and decrypted so as to keep the rights of the developer is the major development direction of current software encryption technology. Now, what have to be obtained are the methods to prevent any unauthorized user to access the resource, to confirm the user's status and to prevent other people reaching the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00
CPCG06F21/121H04L63/068H04L63/0428
Inventor CHANG, ZECHARYHAN, HARRY
Owner ZHIGU HLDG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products